Description
MetInfo through 5.3.17 accepts the same CAPTCHA response for 120 seconds, which makes it easier for remote attackers to bypass intended challenge requirements by modifying the client-server data stream, as demonstrated by the login/findpass page.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-3327 | MetInfo through 5.3.17 accepts the same CAPTCHA response for 120 seconds, which makes it easier for remote attackers to bypass intended challenge requirements by modifying the client-server data stream, as demonstrated by the login/findpass page. |
References
| Link | Providers |
|---|---|
| https://lncken.cn/?p=343 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:19:37.766Z
Reserved: 2017-07-27T00:00:00.000Z
Link: CVE-2017-11717
No data.
Status : Modified
Published: 2017-07-28T05:29:00.933
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-11717
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD